An Improved Data Possession Checking Scheme in Cloud Computing

Article Preview

Abstract:

Remotely data storage in cloud computing faces great challenge. Data possession checking ensures the data integrity and availability. In this paper, a cloud data possession checking model has been presented. Based on Paillier cryptosystem and elliptic curve cryptograph (ECC),we designed a data possession checking scheme, where the user asks the server to compute a checking value of randomly appointed data blocks, and then makes a decision by proof verification. The homomorphic verification tag (HVT) generated based on Paillier cryptosystem to achieve unlimited queried times. Extensive evaluation and analysis shows the proposed scheme is efficient and secure with the features: a high confidence level, un-forged HVTs, a small constant overhead, etc.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 760-762)

Pages:

1733-1737

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] N. Gohring, Amazon's S3 down for several hours, Online at http: /www. pcworld. com/ businesscenter/article/142549/amazons s3 down for several hours. html, (2008).

Google Scholar

[2] Y. Deswarte, J. -J. Quisquater, and A. Saidane. Remote integrity checking. In Proc. of Conference on Integrity and Internal Control in Information Systems '03, Nov (2003).

DOI: 10.1007/1-4020-7901-x_1

Google Scholar

[3] D. L. G. Filho and P. S. L. M. Baretto. Demonstrating data possession and uncheatable data transfer. IACR ePrint archive, 2006. Report 2006/150.

Google Scholar

[4] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, Provable Data Possession at Untrusted Stores, " Proc. Of CCS , 07, p.598–609, (2007).

DOI: 10.1145/1315245.1315318

Google Scholar

[5] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, Scalable and Efficient Provable Data Possession, " Proc. of SecureComm , 08, p.1–10, (2008).

DOI: 10.1145/1460877.1460889

Google Scholar

[6] R. Curtmola, O. Khan, R. Burns, and G. Ateniese, MR-PDP: Multiple-Replica Provable Data Possession, " Proc. of ICDCS , 08, p.411–420, (2008).

DOI: 10.1109/icdcs.2008.68

Google Scholar